Gem-Security / gem-environment-assessmentLinks
Utilities for assessing cloud environments
☆19Updated 2 years ago
Alternatives and similar repositories for gem-environment-assessment
Users that are interested in gem-environment-assessment are comparing it to the libraries listed below
Sorting:
- ElectricEye is a multi-cloud, multi-SaaS Python CLI tool for Asset Management, Security Posture Management & Attack Surface Monitoring su…☆1,022Updated last week
- This repository provides sample templates for security playbooks against various scenarios when using Amazon Web Services.☆639Updated this week
- Bare minimum AWS Security Alerting and Secure by default Configuration☆510Updated 5 months ago
- A python module to allow for easy integration with the Lacework APIs.☆18Updated last year
- AWS CloudSaga - Simulate security events in AWS☆470Updated this week
- AWS IAM linting library☆1,099Updated 4 months ago
- ASEA developer support has ended, and the ASEA github repo will be marked Archived (read-only) by the end of 2025.☆763Updated this week
- A solution for collecting, correlating and visualizing multiple types of logs to help investigate security incidents.☆647Updated 4 months ago
- Sample pipeline demo highlighting how to integrate Falcon Container Sensor into ECS Fargate Workloads☆11Updated 11 months ago
- Protect your data in AWS S3 with DataCop!☆14Updated last year
- Guard offers a policy-as-code domain-specific language (DSL) to write rules and validate JSON- and YAML-formatted data such as CloudForma…☆1,360Updated last month
- An AWS tool to help you create a point in time assessment of your AWS account using Prowler.☆571Updated last month
- Example AWS Service control policies to get started or mature your usage of AWS SCPs.☆262Updated last week
- Open-source temporary elevated access solution for AWS IAM Identity Center.☆438Updated last month
- ☆1,031Updated 2 months ago
- A simple threat modeling tool to help humans to reduce time-to-value when threat modeling☆634Updated 2 weeks ago
- Automated Security Response on AWS is an add-on solution that works with AWS Security Hub to provide a ready-to-deploy architecture and a…☆450Updated 2 months ago
- This repository can be used to generate and evaluate findings detected by Amazon GuardDuty☆411Updated 4 months ago
- Trigger vulnerability assessments for containers which are active in a Lacework account/organization☆22Updated last year
- Assisted Log Enabler for AWS - Find AWS resources that are not logging, and turn them on.☆264Updated this week
- ASH is an extensible, open source SAST, SCA, and IaC security scanner orchestration engine.☆508Updated last month
- A repository of breaches of AWS customers☆788Updated 2 weeks ago
- AWS Security Analytics Bootstrap enables customers to perform security investigations on AWS service logs by providing an Amazon Athena a…☆259Updated this week
- Command Line Interface tool for Cloud Intelligence Dashboards deployment☆492Updated this week
- IAM Least Privilege Policy Generator☆2,118Updated last week
- A command-line tool to get valuable information out of AWS CloudTrail☆827Updated last week
- aws-security-architecture☆14Updated 2 years ago
- Example solutions demonstrating how to implement patterns within the AWS Security Reference Architecture guide using CloudFormation (incl…☆1,104Updated 4 months ago
- CloudTracker helps you find over-privileged IAM users and roles by comparing CloudTrail logs with current IAM policies.☆901Updated 3 years ago
- Runs checks to see if an EKS cluster follows EKS Best Practices.☆932Updated 2 weeks ago